3,159 research outputs found

    Cooperation and Cluster Strategies Within and Between Technology-Intensive Organizations: How to Enhance Linkages among Firms in TechnoParks

    Get PDF
    World today is characterized by rapid transformations in all aspects of human’s life where innovation, technological change and technological progress play the most significant role. Therefore, technologyintensive organizations by engaging in strategic alliances, clusters and networks tend to extract maximum benefits i.e. to enable entry into the international markets and to develop core competences. Even though clusters have become a highly popular strategy, many of them fail to realize their intended goals. Thus, under the scope of this paper we explore why choosing a clustering strategy can be beneficial for technologyintensive organizations. Main focus will be on investigating if there are inter-firm and firm-university linkages among the actors located in a particular techno-park i.e. METU Techno-park and Bilkent Cyber-park. Results of the analysis showed certain extent of firm-university relationships and low level of inter-firm interactions. This further implied necessity of the policy interventions for enhancement of those interactions if the studied techno-parks are to become successful in the sense of the theoretical techno-park model, and if the tenant firms are to extract maximum benefits associated with cluster concept in theory.Clusters, Networks, Innovation, Techno-parks, Policy

    Anti Money Laundering Mechanism: An Application of Principal-Agent Model for Pakistan

    Get PDF
    In this paper anti money laundering policy of the international financial regime is analyzed in principal agent model perspective. The strategy of the principal for formal agents is deliberated for global financial stability. This strategy encompasses incentive and dis-incentive for cooperation of formal agent. Formal agent by cooperating with principal may induce dis-incentive for informal agent. All the integrating stake holders make decision on the basis of comparison of present value of marginal cost of non-cooperation and present value of returns from cooperation. As the desired objective of the principal is to minimize transaction of money through informal channels therefore it has to include informal agents and clients in the strategy. The successful anti money laundering strategy can only be evolved by the cooperation of all the stakeholders.International Financial Regime, Principal Agent model and Money Laundering

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    Made in the USA? The influence of the US on the EU's data protection regime. CEPS Liberty and Security, November 2009

    Get PDF
    Recent developments have shown that the EU’s border security policy is greatly influenced by the US. This influence simultaneously has implications for other EU policies, including those on data protection. This paper highlights that policy-making at the transatlantic level is increasingly taking place through informal networks, such as the High-Level Political Dialogue on Border and Transportation Security and the High-Level Contact Group on data protection, which allow US involvement in EU policy-making. This tendency stems from the growing personal relationships among policy-makers, the gradual substitution of formal instruments with less formal contracts and informal understandings shaping the content of formal agreements. Drawing from empirical examples of EU–US cooperation on data protection in the context of homeland security, the paper analyses the repercussions of these developments and the issues that remain unresolved, and offers policy recommendations

    Solutions and Tools for Secure Communication in Wireless Sensor Networks

    Get PDF
    Secure communication is considered a vital requirement in Wireless Sensor Network (WSN) applications. Such a requirement embraces different aspects, including confidentiality, integrity and authenticity of exchanged information, proper management of security material, and effective prevention and reaction against security threats and attacks. However, WSNs are mainly composed of resource-constrained devices. That is, network nodes feature reduced capabilities, especially in terms of memory storage, computing power, transmission rate, and energy availability. As a consequence, assuring secure communication in WSNs results to be more difficult than in other kinds of network. In fact, trading effectiveness of adopted solutions with their efficiency becomes far more important. In addition, specific device classes or technologies may require to design ad hoc security solutions. Also, it is necessary to efficiently manage security material, and dynamically cope with changes of security requirements. Finally, security threats and countermeasures have to be carefully considered since from the network design phase. This Ph.D. dissertion considers secure communication in WSNs, and provides the following contributions. First, we provide a performance evaluation of IEEE 802.15.4 security services. Then, we focus on the ZigBee technology and its security services, and propose possible solutions to some deficiencies and inefficiencies. Second, we present HISS, a highly scalable and efficient key management scheme, able to contrast collusion attacks while displaying a graceful degradation of performance. Third, we present STaR, a software component for WSNs that secures multiple traffic flows at the same time. It is transparent to the application, and provides runtime reconfigurability, thus coping with dynamic changes of security requirements. Finally, we describe ASF, our attack simulation framework for WSNs. Such a tool helps network designers to quantitatively evaluate effects of security attacks, produce an attack ranking based on their severity, and thus select the most appropriate countermeasures

    [Chile] National Cybersecurity Policy (2017-2022)

    Get PDF
    Identifies public policy measures for 2017-2018, and identifies the national standards and institutions involved in cybersecurity, Provides a risk and threat overview; Identifies the following policy objectives to reach by 2022: Robust and resilient information infrastructure, prepared to face and recover from cybersecurity incidents, under a risk management approach; Protection of people’s rights in cyberspace; Development of a cybersecurity culture based on education, good practices and accountability in the management of digital technologies; Cooperation actions with other stakeholders in the field of cybersecurity and active participation in international forums and discussions; Promoting the development of a cybersecurity industry serving its strategic objectives
    corecore